Analysis
-
max time kernel
155s -
max time network
135s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
29-01-2022 19:10
Static task
static1
Behavioral task
behavioral1
Sample
3181065099986c2bb8b3f58f04f2c59e5bd5887dc46f6e7c9a62ba7d2ca23758.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3181065099986c2bb8b3f58f04f2c59e5bd5887dc46f6e7c9a62ba7d2ca23758.exe
Resource
win10-en-20211208
General
-
Target
3181065099986c2bb8b3f58f04f2c59e5bd5887dc46f6e7c9a62ba7d2ca23758.exe
-
Size
917KB
-
MD5
27790c50a6ddc9b4835973f33d1d5371
-
SHA1
b3af32050b7e243ad623c318899695b717bedb07
-
SHA256
3181065099986c2bb8b3f58f04f2c59e5bd5887dc46f6e7c9a62ba7d2ca23758
-
SHA512
0edbddf4f8e541e7292301de34e5277e63a66240450435c1dc5389005092a4b50f892cd895934ce54e78b6bb4604d2941404f592883f7c2768272a36075b8313
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs
-
Executes dropped EXE 3 IoCs
Processes:
Playboy-022014-Sample.exePLAYBO~1.EXEWINSYS~1.EXEpid process 1388 Playboy-022014-Sample.exe 1840 PLAYBO~1.EXE 1968 WINSYS~1.EXE -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\IXP000.TMP\PLAYBO~1.EXE upx \Users\Admin\AppData\Local\Temp\IXP000.TMP\PLAYBO~1.EXE upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PLAYBO~1.EXE upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PLAYBO~1.EXE upx \Users\Admin\AppData\Local\Temp\IXP000.TMP\PLAYBO~1.EXE upx -
Loads dropped DLL 9 IoCs
Processes:
cmd.exePlayboy-022014-Sample.exePLAYBO~1.EXEWINSYS~1.EXEpid process 268 cmd.exe 268 cmd.exe 1388 Playboy-022014-Sample.exe 1388 Playboy-022014-Sample.exe 1388 Playboy-022014-Sample.exe 1840 PLAYBO~1.EXE 1388 Playboy-022014-Sample.exe 1388 Playboy-022014-Sample.exe 1968 WINSYS~1.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Playboy-022014-Sample.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce Playboy-022014-Sample.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Playboy-022014-Sample.exe -
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3295.tmp\PB02-2014.pdf pdf_with_link_action -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid process 592 reg.exe 1644 reg.exe 1376 reg.exe 1104 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1992 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1992 AcroRd32.exe 1992 AcroRd32.exe 1992 AcroRd32.exe 1992 AcroRd32.exe -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
3181065099986c2bb8b3f58f04f2c59e5bd5887dc46f6e7c9a62ba7d2ca23758.execmd.exePlayboy-022014-Sample.exePLAYBO~1.EXEcmd.exedescription pid process target process PID 612 wrote to memory of 268 612 3181065099986c2bb8b3f58f04f2c59e5bd5887dc46f6e7c9a62ba7d2ca23758.exe cmd.exe PID 612 wrote to memory of 268 612 3181065099986c2bb8b3f58f04f2c59e5bd5887dc46f6e7c9a62ba7d2ca23758.exe cmd.exe PID 612 wrote to memory of 268 612 3181065099986c2bb8b3f58f04f2c59e5bd5887dc46f6e7c9a62ba7d2ca23758.exe cmd.exe PID 612 wrote to memory of 268 612 3181065099986c2bb8b3f58f04f2c59e5bd5887dc46f6e7c9a62ba7d2ca23758.exe cmd.exe PID 268 wrote to memory of 1388 268 cmd.exe Playboy-022014-Sample.exe PID 268 wrote to memory of 1388 268 cmd.exe Playboy-022014-Sample.exe PID 268 wrote to memory of 1388 268 cmd.exe Playboy-022014-Sample.exe PID 268 wrote to memory of 1388 268 cmd.exe Playboy-022014-Sample.exe PID 268 wrote to memory of 1388 268 cmd.exe Playboy-022014-Sample.exe PID 268 wrote to memory of 1388 268 cmd.exe Playboy-022014-Sample.exe PID 268 wrote to memory of 1388 268 cmd.exe Playboy-022014-Sample.exe PID 268 wrote to memory of 1644 268 cmd.exe reg.exe PID 268 wrote to memory of 1644 268 cmd.exe reg.exe PID 268 wrote to memory of 1644 268 cmd.exe reg.exe PID 268 wrote to memory of 1644 268 cmd.exe reg.exe PID 268 wrote to memory of 1376 268 cmd.exe reg.exe PID 268 wrote to memory of 1376 268 cmd.exe reg.exe PID 268 wrote to memory of 1376 268 cmd.exe reg.exe PID 268 wrote to memory of 1376 268 cmd.exe reg.exe PID 268 wrote to memory of 1104 268 cmd.exe reg.exe PID 268 wrote to memory of 1104 268 cmd.exe reg.exe PID 268 wrote to memory of 1104 268 cmd.exe reg.exe PID 268 wrote to memory of 1104 268 cmd.exe reg.exe PID 268 wrote to memory of 592 268 cmd.exe reg.exe PID 268 wrote to memory of 592 268 cmd.exe reg.exe PID 268 wrote to memory of 592 268 cmd.exe reg.exe PID 268 wrote to memory of 592 268 cmd.exe reg.exe PID 1388 wrote to memory of 1840 1388 Playboy-022014-Sample.exe PLAYBO~1.EXE PID 1388 wrote to memory of 1840 1388 Playboy-022014-Sample.exe PLAYBO~1.EXE PID 1388 wrote to memory of 1840 1388 Playboy-022014-Sample.exe PLAYBO~1.EXE PID 1388 wrote to memory of 1840 1388 Playboy-022014-Sample.exe PLAYBO~1.EXE PID 1388 wrote to memory of 1840 1388 Playboy-022014-Sample.exe PLAYBO~1.EXE PID 1388 wrote to memory of 1840 1388 Playboy-022014-Sample.exe PLAYBO~1.EXE PID 1388 wrote to memory of 1840 1388 Playboy-022014-Sample.exe PLAYBO~1.EXE PID 1840 wrote to memory of 1072 1840 PLAYBO~1.EXE cmd.exe PID 1840 wrote to memory of 1072 1840 PLAYBO~1.EXE cmd.exe PID 1840 wrote to memory of 1072 1840 PLAYBO~1.EXE cmd.exe PID 1840 wrote to memory of 1072 1840 PLAYBO~1.EXE cmd.exe PID 1840 wrote to memory of 1072 1840 PLAYBO~1.EXE cmd.exe PID 1840 wrote to memory of 1072 1840 PLAYBO~1.EXE cmd.exe PID 1840 wrote to memory of 1072 1840 PLAYBO~1.EXE cmd.exe PID 1072 wrote to memory of 1992 1072 cmd.exe AcroRd32.exe PID 1072 wrote to memory of 1992 1072 cmd.exe AcroRd32.exe PID 1072 wrote to memory of 1992 1072 cmd.exe AcroRd32.exe PID 1072 wrote to memory of 1992 1072 cmd.exe AcroRd32.exe PID 1072 wrote to memory of 1992 1072 cmd.exe AcroRd32.exe PID 1072 wrote to memory of 1992 1072 cmd.exe AcroRd32.exe PID 1072 wrote to memory of 1992 1072 cmd.exe AcroRd32.exe PID 1388 wrote to memory of 1968 1388 Playboy-022014-Sample.exe WINSYS~1.EXE PID 1388 wrote to memory of 1968 1388 Playboy-022014-Sample.exe WINSYS~1.EXE PID 1388 wrote to memory of 1968 1388 Playboy-022014-Sample.exe WINSYS~1.EXE PID 1388 wrote to memory of 1968 1388 Playboy-022014-Sample.exe WINSYS~1.EXE PID 1388 wrote to memory of 1968 1388 Playboy-022014-Sample.exe WINSYS~1.EXE PID 1388 wrote to memory of 1968 1388 Playboy-022014-Sample.exe WINSYS~1.EXE PID 1388 wrote to memory of 1968 1388 Playboy-022014-Sample.exe WINSYS~1.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\3181065099986c2bb8b3f58f04f2c59e5bd5887dc46f6e7c9a62ba7d2ca23758.exe"C:\Users\Admin\AppData\Local\Temp\3181065099986c2bb8b3f58f04f2c59e5bd5887dc46f6e7c9a62ba7d2ca23758.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\20D9.tmp\4.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\20D9.tmp\Playboy-022014-Sample.exe"Playboy-022014-Sample.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PLAYBO~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PLAYBO~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3295.tmp\2.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3295.tmp\PB02-2014.pdf"6⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINSYS~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINSYS~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v Hidden /t REG_DWORD /d 0x00000000 /f3⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /t REG_DWORD /d 0x00000001 /f3⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v ShowSuperHidden /t REG_DWORD /d 0x00000000 /f3⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL /v CheckedValue /t REG_DWORD /d 0x00000000 /f3⤵
- Modifies registry key
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\20D9.tmp\4.batMD5
e0163521e07df63a73ffabfa0d435ed6
SHA1a2746e09ff4288dd8282f2ca3b82abec5c4829a4
SHA256a2fbd743d5967eeb43ef9068680ffdab22c75151acaac1b95781fdde52ca333f
SHA5126cc2c9dd78d1fca39aca84e07bac3fd64647c469400dc82f86f107777b4281fd59fc24a8c487a89e76472ecba028722c0816fddb9445f7cf60ed6774c05c971d
-
C:\Users\Admin\AppData\Local\Temp\20D9.tmp\Playboy-022014-Sample.exeMD5
258358d543ef8c7924a4656d690cab66
SHA1c8fb15d57f1dbe8163793ed86acaeb9011f60cf1
SHA25681d3df4ad02e565768f937a1f4447723ec84de9532dca92ebf4771b7e663af93
SHA512f6775b6c5ed005ee3f6c0a8de51f48807570276651bfff232196e51376c5af1a45aaa44a1c0244d2e4c7d5c2e02b39675ecb6079e3a9136d6a178cbf22f9aead
-
C:\Users\Admin\AppData\Local\Temp\20D9.tmp\Playboy-022014-Sample.exeMD5
258358d543ef8c7924a4656d690cab66
SHA1c8fb15d57f1dbe8163793ed86acaeb9011f60cf1
SHA25681d3df4ad02e565768f937a1f4447723ec84de9532dca92ebf4771b7e663af93
SHA512f6775b6c5ed005ee3f6c0a8de51f48807570276651bfff232196e51376c5af1a45aaa44a1c0244d2e4c7d5c2e02b39675ecb6079e3a9136d6a178cbf22f9aead
-
C:\Users\Admin\AppData\Local\Temp\3295.tmp\2.batMD5
60d74be17a8fcc6f45fac941e4242946
SHA13e3ee33b342fc92001dd382e593d1c478a2ef78b
SHA256f0d74a8558662a1eb778793b38da902fd1ec7d239660d7a262d764ca0bd5d397
SHA51226388e06a73b5419855abbb62dd6e53919582d7bf5d6b06149a0f887ebd42f06f6f572c3f560444226e9f8331e3c766a39e4f14c5661b459fc768ba4cfc2ab02
-
C:\Users\Admin\AppData\Local\Temp\3295.tmp\PB02-2014.pdfMD5
6b590c826e7ff44670ebfb658b6cf5ad
SHA1bc37e64ecfeb8267d158ece2cb4705174415c6b2
SHA25637bb0fdef5c45e6080b89e2f3fdebf98534aeaaa51f03a446174ef79ebd6505c
SHA51297d59d4b00bf33c3ea098e60d87f844d2fb52f1492a58ac7a1d2ba42b61e373bea57e08d2a049e7a520fc88ded34ea8b50a04ffee7a3ecb7f81aaf77a4da5adc
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PLAYBO~1.EXEMD5
6ae599109190cfa66c5a9e020502276c
SHA1a8094439f821870159e3cb495d1409c4aa74beb7
SHA256993807f036abda972e3121061b9db9ae2292ef7cb3fad8c1d7187ca6f4644b81
SHA51288ea4c95ebecff8b3a5d0f6655cbbe8ef31e9c6b3152d194f53c2b54956a15c7e643f5cdb1e6bca20bb77cea298c9e953a2ba9ad3da1cd2649eab4002d72a1af
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PLAYBO~1.EXEMD5
6ae599109190cfa66c5a9e020502276c
SHA1a8094439f821870159e3cb495d1409c4aa74beb7
SHA256993807f036abda972e3121061b9db9ae2292ef7cb3fad8c1d7187ca6f4644b81
SHA51288ea4c95ebecff8b3a5d0f6655cbbe8ef31e9c6b3152d194f53c2b54956a15c7e643f5cdb1e6bca20bb77cea298c9e953a2ba9ad3da1cd2649eab4002d72a1af
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINSYS~1.EXEMD5
7075a90fee11fa594353a56849f63610
SHA152872bc0480a21982dc2c61328c8dcdf2bbfa725
SHA25635f986cb7a4d5f0b015b4a0ae79f1ac9ccba06ea8577c83163f543fb3047ba88
SHA5120a9de6c2ad65d56e65bec6499cf195753296f1e81197c064995bf0bac82845d6736ead404811a477dd31bfe6b1dc1000853c4f0c60c74ec26ceb87c35c728329
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINSYS~1.EXEMD5
7075a90fee11fa594353a56849f63610
SHA152872bc0480a21982dc2c61328c8dcdf2bbfa725
SHA25635f986cb7a4d5f0b015b4a0ae79f1ac9ccba06ea8577c83163f543fb3047ba88
SHA5120a9de6c2ad65d56e65bec6499cf195753296f1e81197c064995bf0bac82845d6736ead404811a477dd31bfe6b1dc1000853c4f0c60c74ec26ceb87c35c728329
-
\Users\Admin\AppData\Local\Temp\20D9.tmp\Playboy-022014-Sample.exeMD5
258358d543ef8c7924a4656d690cab66
SHA1c8fb15d57f1dbe8163793ed86acaeb9011f60cf1
SHA25681d3df4ad02e565768f937a1f4447723ec84de9532dca92ebf4771b7e663af93
SHA512f6775b6c5ed005ee3f6c0a8de51f48807570276651bfff232196e51376c5af1a45aaa44a1c0244d2e4c7d5c2e02b39675ecb6079e3a9136d6a178cbf22f9aead
-
\Users\Admin\AppData\Local\Temp\20D9.tmp\Playboy-022014-Sample.exeMD5
258358d543ef8c7924a4656d690cab66
SHA1c8fb15d57f1dbe8163793ed86acaeb9011f60cf1
SHA25681d3df4ad02e565768f937a1f4447723ec84de9532dca92ebf4771b7e663af93
SHA512f6775b6c5ed005ee3f6c0a8de51f48807570276651bfff232196e51376c5af1a45aaa44a1c0244d2e4c7d5c2e02b39675ecb6079e3a9136d6a178cbf22f9aead
-
\Users\Admin\AppData\Local\Temp\20D9.tmp\Playboy-022014-Sample.exeMD5
258358d543ef8c7924a4656d690cab66
SHA1c8fb15d57f1dbe8163793ed86acaeb9011f60cf1
SHA25681d3df4ad02e565768f937a1f4447723ec84de9532dca92ebf4771b7e663af93
SHA512f6775b6c5ed005ee3f6c0a8de51f48807570276651bfff232196e51376c5af1a45aaa44a1c0244d2e4c7d5c2e02b39675ecb6079e3a9136d6a178cbf22f9aead
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\PLAYBO~1.EXEMD5
6ae599109190cfa66c5a9e020502276c
SHA1a8094439f821870159e3cb495d1409c4aa74beb7
SHA256993807f036abda972e3121061b9db9ae2292ef7cb3fad8c1d7187ca6f4644b81
SHA51288ea4c95ebecff8b3a5d0f6655cbbe8ef31e9c6b3152d194f53c2b54956a15c7e643f5cdb1e6bca20bb77cea298c9e953a2ba9ad3da1cd2649eab4002d72a1af
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\PLAYBO~1.EXEMD5
6ae599109190cfa66c5a9e020502276c
SHA1a8094439f821870159e3cb495d1409c4aa74beb7
SHA256993807f036abda972e3121061b9db9ae2292ef7cb3fad8c1d7187ca6f4644b81
SHA51288ea4c95ebecff8b3a5d0f6655cbbe8ef31e9c6b3152d194f53c2b54956a15c7e643f5cdb1e6bca20bb77cea298c9e953a2ba9ad3da1cd2649eab4002d72a1af
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\PLAYBO~1.EXEMD5
6ae599109190cfa66c5a9e020502276c
SHA1a8094439f821870159e3cb495d1409c4aa74beb7
SHA256993807f036abda972e3121061b9db9ae2292ef7cb3fad8c1d7187ca6f4644b81
SHA51288ea4c95ebecff8b3a5d0f6655cbbe8ef31e9c6b3152d194f53c2b54956a15c7e643f5cdb1e6bca20bb77cea298c9e953a2ba9ad3da1cd2649eab4002d72a1af
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINSYS~1.EXEMD5
7075a90fee11fa594353a56849f63610
SHA152872bc0480a21982dc2c61328c8dcdf2bbfa725
SHA25635f986cb7a4d5f0b015b4a0ae79f1ac9ccba06ea8577c83163f543fb3047ba88
SHA5120a9de6c2ad65d56e65bec6499cf195753296f1e81197c064995bf0bac82845d6736ead404811a477dd31bfe6b1dc1000853c4f0c60c74ec26ceb87c35c728329
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINSYS~1.EXEMD5
7075a90fee11fa594353a56849f63610
SHA152872bc0480a21982dc2c61328c8dcdf2bbfa725
SHA25635f986cb7a4d5f0b015b4a0ae79f1ac9ccba06ea8577c83163f543fb3047ba88
SHA5120a9de6c2ad65d56e65bec6499cf195753296f1e81197c064995bf0bac82845d6736ead404811a477dd31bfe6b1dc1000853c4f0c60c74ec26ceb87c35c728329
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINSYS~1.EXEMD5
7075a90fee11fa594353a56849f63610
SHA152872bc0480a21982dc2c61328c8dcdf2bbfa725
SHA25635f986cb7a4d5f0b015b4a0ae79f1ac9ccba06ea8577c83163f543fb3047ba88
SHA5120a9de6c2ad65d56e65bec6499cf195753296f1e81197c064995bf0bac82845d6736ead404811a477dd31bfe6b1dc1000853c4f0c60c74ec26ceb87c35c728329
-
memory/612-54-0x0000000075891000-0x0000000075893000-memory.dmpFilesize
8KB